[Blog] Five Pentesting Tools and Techniques (That Every Sysadmin Should Know)
Step into the mind of a pentester...
Cybersecurity SME in
the D.C. Metro Area
Cybersecurity expertise to
enable your mission— not hinder it.
Jeremy Trinka is a passionate cybersecurity leader with hands-on experience spearheading initiatives across Infrastructure Technology, Incident Response, Vulnerability Management, and Penetration Testing programs.
Mr. Trinka has worked with organizations to refine cybersecurity initiatives which maintain productivity and efficiency. He has worked with Fortune 500 companies, the Federal Government, high-profile financial institutions, and healthcare organizations leading cybersecurity efforts.
Mr. Trinka has over 12 years of experience in Cybersecurity and IT, maintains a diverse set of certifications (CISSP, CEH, ITIL, Linux+, Project+, Security+, Network+, A+) and is an alumnus of Western Governors University with a Masters of Science in Cybersecurity and Information Assurance.A showcase of his work can be seen below.
Step into the mind of a pentester...
Post-exploitation tools are the bread-and-butter for any successful cyber-attacker...
The Federal Government is moving to the cloud at a rapid pace, fueled by the desire to modernize and consolidate IT infrastructure...
CVSS 3.0 "Critical" vulnerability discovered by Jeremy Trinka.
Cybersecurity risk has taken over as the number one topic keeping CIOs and CISOs up at night...
It is often said that you must ‘know your enemy’ in order to succeed, but for many it may be a difficult mindset to step into...
Always interested in extending his professional network, Mr. Trinka can be reached directly via LinkedIn.